Search Results

Search found 30819 results on 1233 pages for 'software security'.

Page 540/1233 | < Previous Page | 536 537 538 539 540 541 542 543 544 545 546 547  | Next Page >

  • CVE-2011-2728 Denial of Service (DoS) vulnerability in Perl

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-2728 Denial of Service (DoS) vulnerability 4.3 Perl 5.6 Solaris 10 SPARC: 146032-03 X86: 146033-03 Solaris 9 Patches planned but not yet available This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2012-3524 Permissions, Privileges, and Access Controls vulnerability in libdbus

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-3524 Permissions, Privileges, and Access Controls vulnerability 6.9 libdbus Solaris 11 11/11 SRU 12.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple vulnerabilities in PostgreSQL

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-3488 Permissions, Privileges, and Access Controls vulnerability 5.8 PostgreSQL Solaris 10 SPARC : 138822-11 , 138824-11 , 138826-11 x86 : 138823-11 , 138825-11 , 138827-11 CVE-2012-3489 Improper Input Validation vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2011-3102 Numeric Errors vulnerability in libxml2

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3102 Numeric Errors vulnerability 10.0 libxml2 Solaris 11 11/11 SRU 10.5 Solaris 10 SPARC : 125731-08 , x86 : 125732-08 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Looking for a product configurator

    - by Netsrac
    I am looking for a product configurator for products with high complexity. The main goal is to allow a sales person to configure the product in a correct and working manner. The product is a combination of hard- and software options. The options for sure have dependecies (so option A needs B and C) and can also exclude each other. The performance requirements of the software related to the hardware need to be considered. So some rules need to be defineable. Does anybody know a tool (preferred open source) doing that job? Thanks for your help.

    Read the article

  • In Ubuntu Linux, how do I list packages installed from the “universe” repository?

    - by Nate
    On an Ubuntu 10.04 LTS server, I want to list installed packages and see what repository they come from. It’s easy to list installed packages, but it does not include the name of the repository (such as “main” or “universe”). And this information isn’t in /var/lib/dpkg/status, so dpkg-query doesn’t show it either. I want to get a list of “unsupported” software—that is, software that doesn’t come from the “main” repository, and for which Ubuntu does not guarantee security updates. Note: This is a server. It does not have X, GNOME or KDE installed.

    Read the article

  • Identity and Access Management Market Forecast to 2012

    With steady increase in the number of organizations across the world and incorporation of Information Technology into their businesses, the importance/need for proper security measures have become an... [Author: RNCOS E-Services Pvt. Ltd. - Computers and Internet - June 17, 2010]

    Read the article

  • CVE-2012-4245 Arbitrary code execution vulnerability in Gimp

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-4245 Arbitrary code execution vulnerability 6.8 Gimp Solaris 11 11/11 SRU 12.4 Solaris 10 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Securing Microsoft Silverlight Applications

    Come hear how to protect Silverlight applications from common threats, including securing your application from intruders, eavesdroppers, and users as well as protecting your code, your data, and your servers from attacks. Also, hear about the key security vectors that must be considered when using Silverlight, such as securing applications that often live outside firewalls....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Easiest (free) way to get VM hosting Windows OS, on Windows 7 Ultimate 64bit

    - by John
    I'm a software developer and my workstation is running Win7 Ultimate, 64bit. I want to run a virtual PC on which I can deploy and run the web-software I create, as a virtual web-server PC. I want the VM to also be Windows as that's what I know, the version isn't too important but on that PC I want to run things like MySQL, TomCat, etc. I see VMWare make 'Player', also I see VirtualBox and I know MS also have solutions too, which I've heard good things about. Does it make much difference which I use as far as creating & using VMs? Or are they all pretty similar?

    Read the article

  • Native PHP vs exec()

    - by resting
    Just wondering, assuming no security issues, that is, you're in total control of the command passed to exec(), is there a difference (in terms of speed or standards) between using exec() vs native PHP? Example just to name a few use cases: Using the DirectoryIterator vs exec(ls -1, $output), to list all files. List 100 files from the 99th file onwards (that is, file 100 to 199) Count total number of files in directory.

    Read the article

  • Top 5 Free Linux Distributions for Servers in 2010

    <b>Simple Thoughts:</b> "There are five distributions to compare - Debian, CentOS, Slackware , Ubuntu and Gentoo. One of the main consideration for server use is stability and long term security support. After extensive research we queued up the top 5 free Linux distros for server in 2010."

    Read the article

  • What do you consider standard job perks? [closed]

    - by reseter
    What does a company need to offer you (apart from a fat pay cheque) for you to work for them? I am aware of this question, which is from an employer's perspective. I am interested in your views as employees. To get the discussion started, here is a list off the top of my head (not in any particular order): High-end computer with a huge screen or two. The best software tool money can buy as per Joel's test). That isn't too much to ask given many of the best tools are free (think git). Flexibility is a bonus- if a particular platform/ piece of software is not absolutely required, I would like to pick my OS and IDE. A quality chair Quiet workspace. Open plan is fine as long as there are meeting rooms so that there is no constant chatter going on around me. Spacious workspace. I would rather have more than three inches between my mouse and the person next to me's keyboard. Food and drink at work. Many companies these days have fruit baskets, biscuits, etc available to their employees, some even offer free lunch. Education. If my employer wants my skills to stay up-to-date, they should at the very least understand I need time to learn. If they want to pay for my books and conference registration fees, I am more than happy to accept. Other options include organizing internal knowledge exchange days or inviting speakers from outside. Flexible hours/ option to work from home is a bonus

    Read the article

  • TechEd 2010 Sessions on ASP.NET

    Join  us in New Orleans for your choice of 200- to 400-level ASP.NET sessions on using Microsoft SharePoint Server 2010, creating report subscriptions, deploying cohesive web service security and more.

    Read the article

  • MSI Install over network with Admin Rights

    - by user45237
    I have been asked to install software.msi over a network to a group of users as they logon. My issue is that they also need admin rights to install this software. I have tried using runas command but it askes the user to input a password. I have also tried using MSIEXEC but still stating user has not enough privalages. Giving users admin rights accross the network or locally is also no an option. Help please! Andy.

    Read the article

  • CVE-2012-4244 Denial of Service vulnerability in ISC BIND

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-4244 Denial of Service vulnerability 7.8 BIND Solaris 11 Contact Support Solaris 10 SPARC : 119783-24 , x86 : 119784-24 Solaris 9 SPARC : 112837-28 , x86 : 114265-27 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Microsoft: Two 'Critical' Fixes Coming Tuesday

    Microsoft expects to deliver just two critical fixes in its May security update, arriving this Tuesday....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Mobilizing A Community To Fight Malware

    <b>Help Net Security:</b> "The word about Immunet's free anti-virus solution is spreading fast. The agent installed on my computer tells me that there are currently 162,597 people in the Immunet Cloud, and that I'm protected from 12,637,576 threats"

    Read the article

  • Multiple vulnerabilities in International Components for Unicode (ICU)

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-2791 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 International Components for Unicode (ICU) Solaris 10 SPARC: 119810-07 X86: 119811-07 Solaris 11 11/11 SRU 11.4 CVE-2011-4599 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Moving soon, fiancee has new job: how to transition?

    - by Anonymous
    I've found myself in a sort of conundrum lately and I figured Stack Overflow would be the place to ask this question. I normally post under my personal account here, but I'm writing in anonymously this time so as to make sure my co-workers don't find out too early that I'll be leaving them behind in a few months. My fiancee just landed a great software development job at a very large, stable company. She'll be starting after she graduates and just after we get married (May to June-ish). Her compensation and benefits package will be more than enough to take care of both of us, so I agreed to step down from my current position so we could move to a larger city with more opportunities. I'll probably take a few weeks off to decompress, but I don't want to stay unemployed very long. Since there will be less pressure on me to bring home a second income though, we're not as adverse to risk as we normally would be. I'm currently debating whether to eventually seek employment at a small company, a larger company, do contract work, or do something else entirely. I haven't been in the software development business long (2-3 years plus some small personal projects), but I've seen what things can be like at a startup (my first job) and at a more established, mid-sized business (my current job). Most importantly what I'm looking for out of a new employment opportunity is challenge and variety. Does this situation describe anyone on SO? If so, what did you do/what are you doing? How is it working out for you? Programming is a pleasure as well as a career skill for me, so I want to make sure it stays that way. Thanks to all in advance for any responses.

    Read the article

< Previous Page | 536 537 538 539 540 541 542 543 544 545 546 547  | Next Page >